Chapter 11 Flashcards

(20 cards)

1
Q
  1. John is now responsible for system security at a small bookkeeping firm. He wants to ensure that he implements good fundamental security. What is the most basic rule of computer security?
    A. Keep systems patched.
    B. Always use an IDS.
    C. Install a firewall.
    D. Always use antispyware.
A

A. Keep systems patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q
  1. Which of the following is not one of the phases listed in NIST 800-115?
    A. Planning
    B. Execution
    C. Post-assessment
    D. Post-execution
A

C. Post-assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You work in the network security department of a large bank. One of your jobs is to keep all systems patched. How might you ensure that system patches are kept up to date?
    A. Use an automated patching system.
    B. Patch any time you receive a vendor notification of a new patch.
    C. Patch whenever a new threat is announced.
    D. Use periodic scheduled patching.
A

A. Use an automated patching system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Teresa is explaining basic security to a new technician. She is teaching him how to secure ports on any server or workstation. What is the rule about ports?
    A. Block all incoming ports.
    B. Block ICMP packets.
    C. Block all unused ports.
    D. Block all nonstandard ports.
A

C. Block all unused ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Miguel is trying to secure a web server. He has decided to shut down any services that are not needed. His supervisor has told him to check dependencies first. Which of the following is a good reason to check dependencies before shutting down a service?
    A. To determine whether you will need to shut down other services as well
    B. To determine whether shutting down this service will affect other services
    C. To find out what this service does
    D. To find out whether this service is critical to system operations
A

B. To determine whether shutting down this service will affect other services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?
    A. Block all ports except 80.
    B. Do not block any ports.
    C. Block all ports that you don’t need.
    D. Do not block well-known ports.
A

A. Block all ports except 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. You are trying to implement good fundamental security for a small company. Which of the following is the least essential device for protecting your network?
    A. Firewall
    B. Virus scanners on all machines
    C. IDS system
    D. Proxy server
A

D. Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Mohammed is responsible for security policies at a university. He is trying to ensure proper access policies. What is the rule of thumb on data access?
    A. Data must be available to the widest range of people possible.
    B. Only administrators and supervisors should access sensitive data.
    C. Only those with a need for the specific data should have access.
    D. All employees should have access to any data used in their department.
A

C. Only those with a need for the specific data should have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What are the main phases of the NSA-IAM process?
    A. Planning, on-site assessment, post-assessment
    B. Planning, execution, post-execution
    C. Pre-assessment, execution, post-assessment
    D. Pre-assessment, on-site assessment, post-assessment
A

D. Pre-assessment, on-site assessment, post-assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is the minimum frequency for system probing and audits?
    A. Once per month
    B. Once per year
    C. Every other year
    D. Every other month
A

B. Once per vear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. An audit should check what areas?
    A. Perform system patching, review policies, check personnel records of all managers, and probe for flaws
    B. Only probe for flaws
    C. Perform system patches, probe for flaws, check logs, and review policies
    D. Check all machines for illicit software, perform complete system virus scan, and review firewall policies
A

C. Perform system patches, probe for flaws, check logs, and review policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Jerod is setting up security for a server room for a university. Which of the following is true of the room in which the server is located?
    A. It should be in the most fire-resistant room in the building.
    B. It should have a strong lock with a strong door.
    C. It should be accessible only to those who have a need for access.
    D. All of these answers are correct.
A

D. All of these answers are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Elizabeth is responsible for security policies at her organization. She is trying to implement sound end-user security policies. What would be most important to block end users from doing on their own machine?
    A. Running programs other than those installed by the IT staff
    B. Surfing the Web and using chat rooms
    C. Changing their screensaver and using chat rooms
    D. Installing software or changing system settings
A

D. Installing software or changing system settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the preferred method for storing backups?
    A. Near the server for quick restore if needed
    B. Offsite in a secure location
    C. In the IT manager’s office for security
    D. At the home of one of the IT staff
A

B. Offsite in a secure location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is a step you would definitely take with any server but might not be required for a workstation?
    A. Uninstall all unneeded programs/software.
    B. Shut down unneeded services.
    C. Turn off the screensaver.
    D. Block all Internet access.
A

A. Uninstall all unneeded programs/software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is a step you might take for large networks but not for smaller networks?
    A. Use an IDS.
    B. Segment the network with firewalls between the segments.
    C. Use antivirus software on all machines on the network.
    D. Do criminal background checks for network administrators.
A

B. Segment the network with firewalls between the segments.

16
Q
  1. Which of the following is a common way to establish security between a web server and a network?
    A. Block all traffic between the web server and the network.
    B. Place virus scanning between the network and the web server.
    C. Put a firewall between the web server and the network.
    D. Do not connect your network to the web server.
A

C. Put a firewall between the web server and the network.

17
Q
  1. What is the rule on downloading from the Internet?
    A. Never download anything.
    B. Only download if the download is free of charge.
    C. Only download from well-known, reputable sites.
    D. Never download executables. Only download graphics.
A

C. Only download from well-known, reputable sites.

18
Q
  1. Which of the following certifications is the most prestigious?
    A. CISSP
    B. PE
    C. MCSA
    D. Security +
19
Q
  1. Which of the following set of credentials would be best for a security consultant?
    A. Ten years of IT experience, 1 year in security, CIW Security analyst, M.B.A.
    B. Eight years of IT experience, 3 years in security, CISSP, B.S. in computer science
    C. Eleven years of IT experience, 3 years in security, MCSE and CISSP, M.S. in information systems
    D. Ten years of experience as a hacker and cracker, MCSE/CIW and Security+, Ph.D. in computer science
A

D. Ten years of experience as a hacker and cracker, MCSE/CIW and Security+, Ph.D. in computer science